Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Ansible provisioner and playbook for Ubuntu 20.04 + 18.04 #109

Merged
merged 9 commits into from
Oct 6, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -138,6 +138,10 @@ build {
source = "${path.cwd}/certificates/root-ca.crt"
}

provisioner "ansible-local" {
playbook_file = "${path.cwd}/scripts/ansible/playbook.yml"
}

provisioner "shell" {
execute_command = "echo '${var.build_password}' | {{.Vars}} sudo -E -S sh -eux '{{.Path}}'"
environment_vars = [
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -136,8 +136,12 @@ build {
source = "${path.cwd}/certificates/root-ca.crt"
}

provisioner "ansible-local" {
playbook_file = "${path.cwd}/scripts/ansible/playbook.yml"
}

provisioner "shell" {
execute_command = "echo '${var.build_password}' | {{.Vars}} sudo -E -S sh -eux '{{.Path}}'"
execute_command = "echo '${var.build_password}' | {{.Vars}} sudo -E -S sh -eux '{{.Path}}'"
environment_vars = [
"BUILD_USERNAME=${var.build_username}",
"BUILD_KEY=${var.build_key}",
Expand Down
51 changes: 51 additions & 0 deletions scripts/ansible/playbook.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
---

# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
# WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
# COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
# OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

- hosts: localhost
gather_facts: yes
become: true
tasks:
- name: System Details
debug: msg="{{ item }}"
with_items:
- "{{ ansible_distribution }}"

- block: # Ubuntu Distributions
- name: Update Cache and Upgrade Packages
apt:
name: "*"
state: latest
update_cache: yes
force_apt_get: true

- name: Install Additional Packages
apt:
name:
- bash-completion
- curl
- wget
- git
- net-tools
- unzip
- ca-certificates
state: latest

- name: Install CA Certificate
copy:
src: /tmp/root-ca.crt
dest: /usr/local/share/ca-certificates/
owner: root
group: root
mode: 0644
notify:
- Ubuntu - Update Trusted CA
when:
- ansible_distribution == "Ubuntu"

handlers:
- name: Ubuntu - Update Trusted CA
shell: /usr/sbin/update-ca-certificates
46 changes: 11 additions & 35 deletions scripts/linux/ubuntu-server-18.sh
Original file line number Diff line number Diff line change
Expand Up @@ -13,29 +13,6 @@ export BUILD_KEY
export ANSIBLE_USERNAME
export ANSIBLE_KEY

### Update the guest operating system. ###
echo '> Updating the guest operating system ...'
sudo apt-get update
sudo apt-get upgrade -y

### Install additional packages. ###
echo '> Installing additional packages ...'
sudo apt-get install -y \
curl \
wget \
git \
net-tools \
unzip \
ca-certificates

### Install the Certificate Authority certificates and add to the certificate authority trust. ###
echo '> Installing the Certificate Authority certificates and adding to the certificate authority trust ...'
sudo chown -R root:root /tmp/root-ca.crt
sudo chmod 644 /tmp/root-ca.crt
sudo cp /tmp/root-ca.crt /usr/local/share/ca-certificates/
sudo update-ca-certificates
sudo rm -rf /tmp/root-ca.crt

### Update the default local user. ###
echo '> Updating the default local user ...'
echo '> Adding authorized_keys for the default local user ...'
Expand Down Expand Up @@ -78,10 +55,10 @@ sudo systemctl restart sshd

### Create the clean script. ###
echo '> Creating the clean script ...'
sudo cat <<EOF > /tmp/clean.sh
sudo cat <<EOF > /home/$BUILD_USERNAME/clean.sh
tenthirtyam marked this conversation as resolved.
Show resolved Hide resolved
#!/bin/bash

### Cleans all audit logs. ###
### Cleans all audit logs. ###
echo '> Cleaning all audit logs ...'
if [ -f /var/log/audit/audit.log ]; then
cat /dev/null > /var/log/audit/audit.log
Expand All @@ -93,7 +70,7 @@ if [ -f /var/log/lastlog ]; then
cat /dev/null > /var/log/lastlog
fi

### Cleans persistent udev rules. ###
### Cleans persistent udev rules. ###
echo '> Cleaning persistent udev rules ...'
if [ -f /etc/udev/rules.d/70-persistent-net.rules ]; then
rm /etc/udev/rules.d/70-persistent-net.rules
Expand Down Expand Up @@ -132,18 +109,17 @@ echo > ~/.bash_history
rm -fr /root/.bash_history
EOF

### Change the permissions on /tmp/clean.sh. ###
echo '> Changing the permissions on /tmp/clean.sh ...'
sudo chmod +x /tmp/clean.sh
### Change the permissions on /home/$BUILD_USERNAME/clean.sh. ###
echo '> Changing the permissions on /home/$BUILD_USERNAME/clean.sh ...'
sudo chmod +x /home/$BUILD_USERNAME/clean.sh

### Run the clean script. ###
### Run the clean script. ###
echo '> Running the clean script ...'
sudo /tmp/clean.sh
sudo /home/$BUILD_USERNAME/clean.sh

### Generate the host keys using ssh-keygen. ###
### Generate the host keys using ssh-keygen. ###
echo '> Generating the host keys using ssh-keygen ...'
sudo ssh-keygen -A

### Done. ###
echo '> Done.'

### Done. ###
echo '> Done.'
43 changes: 10 additions & 33 deletions scripts/linux/ubuntu-server-2x.sh
Original file line number Diff line number Diff line change
Expand Up @@ -13,29 +13,6 @@ export BUILD_KEY
export ANSIBLE_USERNAME
export ANSIBLE_KEY

### Update the guest operating system. ###
echo '> Updating the guest operating system ...'
sudo apt-get update
sudo apt-get upgrade -y

### Install additional packages. ###
echo '> Installing additional packages ...'
sudo apt-get install -y \
curl \
wget \
git \
net-tools \
unzip \
ca-certificates

### Install the Certificate Authority certificates and add to the certificate authority trust. ###
echo '> Installing the Certificate Authority certificates and adding to the certificate authority trust ...'
sudo chown -R root:root /tmp/root-ca.crt
sudo chmod 644 /tmp/root-ca.crt
sudo cp /tmp/root-ca.crt /usr/local/share/ca-certificates/
sudo update-ca-certificates
sudo rm -rf /tmp/root-ca.crt

### Update the default local user. ###
echo '> Updating the default local user ...'
echo '> Adding authorized_keys for the default local user ...'
Expand Down Expand Up @@ -78,10 +55,10 @@ sudo systemctl restart sshd

### Create the clean script. ###
echo '> Creating the clean script ...'
sudo cat <<EOF > /tmp/clean.sh
sudo cat <<EOF > /home/$BUILD_USERNAME/clean.sh
#!/bin/bash

### Cleans all audit logs. ###
### Cleans all audit logs. ###
echo '> Cleaning all audit logs ...'
if [ -f /var/log/audit/audit.log ]; then
cat /dev/null > /var/log/audit/audit.log
Expand All @@ -93,7 +70,7 @@ if [ -f /var/log/lastlog ]; then
cat /dev/null > /var/log/lastlog
fi

### Cleans persistent udev rules. ###
### Cleans persistent udev rules. ###
echo '> Cleaning persistent udev rules ...'
if [ -f /etc/udev/rules.d/70-persistent-net.rules ]; then
rm /etc/udev/rules.d/70-persistent-net.rules
Expand Down Expand Up @@ -139,17 +116,17 @@ echo > ~/.bash_history
rm -fr /root/.bash_history
EOF

### Change the permissions on /tmp/clean.sh . ###
echo '> Changing the permissions on /tmp/clean.sh ...'
sudo chmod +x /tmp/clean.sh
### Change the permissions on /home/$BUILD_USERNAME/clean.sh . ###
echo '> Changing the permissions on /home/$BUILD_USERNAME/clean.sh ...'
sudo chmod +x /home/$BUILD_USERNAME/clean.sh

### Run the clean script. ###
### Run the clean script. ###
echo '> Running the clean script ...'
sudo /tmp/clean.sh
sudo /home/$BUILD_USERNAME/clean.sh

### Generate the host keys using ssh-keygen. ###
### Generate the host keys using ssh-keygen. ###
echo '> Generating the host keys using ssh-keygen ...'
sudo ssh-keygen -A

### Done. ###
### Done. ###
echo '> Done.'